General

  • Target

    1838c7ab3a0e8aa21df6b5d74021c97d2c17e5018a4082291fd2db814793031c

  • Size

    99KB

  • Sample

    220212-dr4f8sghcp

  • MD5

    511a9557f8f087a77143afc81ce5addf

  • SHA1

    b1559ec3f6551e6adbcb19511096406b6f976cdb

  • SHA256

    1838c7ab3a0e8aa21df6b5d74021c97d2c17e5018a4082291fd2db814793031c

  • SHA512

    52edc6a5040242e3e4dd631ed34554179184da1eba91f8eff11341f3709687deab51c7cc459c6d86aa218be558103292d2587ad05d15a2c39e94368b4f37ac83

Malware Config

Targets

    • Target

      1838c7ab3a0e8aa21df6b5d74021c97d2c17e5018a4082291fd2db814793031c

    • Size

      99KB

    • MD5

      511a9557f8f087a77143afc81ce5addf

    • SHA1

      b1559ec3f6551e6adbcb19511096406b6f976cdb

    • SHA256

      1838c7ab3a0e8aa21df6b5d74021c97d2c17e5018a4082291fd2db814793031c

    • SHA512

      52edc6a5040242e3e4dd631ed34554179184da1eba91f8eff11341f3709687deab51c7cc459c6d86aa218be558103292d2587ad05d15a2c39e94368b4f37ac83

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks